We constrcut 20 strategies utilizing the obfuscator Radon, and test them on the six clone detectors selected in our work, the results are listed as follows. Specifically, 20 obfuscation test data sets are genereated corresponding to the 20 strategies, which are detetcted through the clone detection tools, calculating the detection results and the difference with the ones of the original data set before obfuscation, the statistical results are listed as follows.
We constrcut 20 strategies utilizing the obfuscator JBCO, and test them on the six clone detectors selected in our work, the results are listed as follows. Specifically, 20 obfuscation test data sets are genereated corresponding to the 20 strategies, which are detetcted through the clone detection tools, calculating the detection results and the difference with the ones of the original data set before obfuscation, the statistical results are listed as follows.
We constrcut 26 strategies utilizing the obfuscator Obfuscator, and test them on the six clone detectors selected in our work, the results are listed as follows. Specifically, 26 obfuscation test data sets are genereated corresponding to the 20 strategies, which are detetcted through the clone detection tools, calculating the detection results and the difference with the ones of the original data set before obfuscation, the statistical results are listed as follows.
As only one strategy belonging to all these three obfuscators originally, we test this one of them respectively ont the six clone detectors in this work. Specifically, one obfuscation test data set is genereated corresponding to the one strategy owned by each of them respectively, which are detetcted through the clone detection tools, calculating the detection results and the difference with the ones of the original data set before obfuscation, the statistical results are listed as follows, from left to right are : JODE, ProGuard, yGuard
As we should make sure that the data type of both the true clone pairs and false clone pairs keep the original type after decompilation during the generation of the original data set process, we randomly select 100 pieces of records covering both the true or false clone pairs and analyze them manually. The analysis result shows that 92 pairs of them retain the original clone type except for individual failures due to the compilation optimization, the percentage of which reaches 92%. The related details are listed in the following table.
CONFIGURATIONS OF OBFUSCATION TOOLS